共 29 条
[1]
Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
[2]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[3]
Clark G.C., 1981, Error-Correction Coding for Digital Communications
[4]
DENG J, 2005, P INT C MOB AD HOC S, P732
[5]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[6]
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[7]
Du WL, 2004, IEEE INFOCOM SER, P586
[8]
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[10]
HUANG D, 2005, P 19 IEEE INT PAR DI, P240